Microsoft.DiaSymReader.Native.amd64.dll
Description: Dia based SymReader
Authors: © Microsoft Corporation. All rights reserved.
Version: 14.29.30152.0
Architecture: 64-bit
Operating System: Windows
SHA256: 76d0da51c2ed6ce4de34f0f703af564c
File Size: 1.8 MB
Uploaded At: Dec. 3, 2025, 2:41 a.m.
Views: 7
Exported Functions
- CreateNGenPdbWriter (Ordinal: 1, Address: 0x167c0)
- CreateSymReader (Ordinal: 2, Address: 0x16930)
- CreateSymWriter (Ordinal: 3, Address: 0x16590)
- DllCanUnloadNow (Ordinal: 4, Address: 0x16780)
- DllGetClassObject (Ordinal: 5, Address: 0x165c0)
- DllGetClassObjectInternal (Ordinal: 6, Address: 0x165c0)
- DllRegisterServer (Ordinal: 7, Address: 0x167b0)
- DllUnregisterServer (Ordinal: 8, Address: 0x167b0)
- VSDllRegisterServer (Ordinal: 9, Address: 0x167b0)
- VSDllUnregisterServer (Ordinal: 10, Address: 0x167b0)
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x18015a000)
- RegOpenKeyExW (Address: 0x18015a008)
- RegQueryValueExW (Address: 0x18015a010)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x18015a340)
- AcquireSRWLockShared (Address: 0x18015a348)
- CloseHandle (Address: 0x18015a288)
- CloseThreadpoolWork (Address: 0x18015a3a8)
- CompareStringW (Address: 0x18015a1f8)
- CreateFileMappingA (Address: 0x18015a320)
- CreateFileMappingW (Address: 0x18015a2d0)
- CreateFileW (Address: 0x18015a280)
- CreateThreadpoolWork (Address: 0x18015a390)
- DeleteCriticalSection (Address: 0x18015a070)
- DeleteFileW (Address: 0x18015a300)
- DeviceIoControl (Address: 0x18015a310)
- DisableThreadLibraryCalls (Address: 0x18015a040)
- EncodePointer (Address: 0x18015a110)
- EnterCriticalSection (Address: 0x18015a068)
- ExitProcess (Address: 0x18015a160)
- ExpandEnvironmentStringsW (Address: 0x18015a350)
- FindClose (Address: 0x18015a188)
- FindFirstFileExW (Address: 0x18015a190)
- FindNextFileW (Address: 0x18015a198)
- FlushFileBuffers (Address: 0x18015a240)
- FormatMessageW (Address: 0x18015a2a0)
- FreeEnvironmentStringsW (Address: 0x18015a1e8)
- FreeLibrary (Address: 0x18015a028)
- GetACP (Address: 0x18015a1a8)
- GetCommandLineA (Address: 0x18015a1c0)
- GetCommandLineW (Address: 0x18015a1c8)
- GetConsoleMode (Address: 0x18015a258)
- GetConsoleOutputCP (Address: 0x18015a250)
- GetCPInfo (Address: 0x18015a1b8)
- GetCurrentDirectoryW (Address: 0x18015a380)
- GetCurrentProcess (Address: 0x18015a0e8)
- GetCurrentProcessId (Address: 0x18015a088)
- GetCurrentThreadId (Address: 0x18015a050)
- GetDriveTypeW (Address: 0x18015a378)
- GetEnvironmentStringsW (Address: 0x18015a1e0)
- GetEnvironmentVariableW (Address: 0x18015a2a8)
- GetFileAttributesW (Address: 0x18015a2e0)
- GetFileSize (Address: 0x18015a2c8)
- GetFileSizeEx (Address: 0x18015a260)
- GetFileType (Address: 0x18015a218)
- GetFullPathNameW (Address: 0x18015a358)
- GetLastError (Address: 0x18015a020)
- GetModuleFileNameW (Address: 0x18015a170)
- GetModuleHandleExW (Address: 0x18015a168)
- GetModuleHandleW (Address: 0x18015a0e0)
- GetNativeSystemInfo (Address: 0x18015a038)
- GetOEMCP (Address: 0x18015a1b0)
- GetProcAddress (Address: 0x18015a148)
- GetProcessHeap (Address: 0x18015a208)
- GetStartupInfoW (Address: 0x18015a0d0)
- GetStdHandle (Address: 0x18015a210)
- GetStringTypeW (Address: 0x18015a220)
- GetSystemInfo (Address: 0x18015a2b8)
- GetSystemTimeAsFileTime (Address: 0x18015a090)
- GetTickCount (Address: 0x18015a2b0)
- HeapAlloc (Address: 0x18015a178)
- HeapFree (Address: 0x18015a180)
- HeapReAlloc (Address: 0x18015a230)
- HeapSize (Address: 0x18015a228)
- InitializeCriticalSection (Address: 0x18015a078)
- InitializeCriticalSectionAndSpinCount (Address: 0x18015a120)
- InitializeCriticalSectionEx (Address: 0x18015a030)
- InitializeSListHead (Address: 0x18015a098)
- InitializeSRWLock (Address: 0x18015a328)
- InterlockedFlushSList (Address: 0x18015a100)
- IsDebuggerPresent (Address: 0x18015a0b8)
- IsProcessorFeaturePresent (Address: 0x18015a0d8)
- IsValidCodePage (Address: 0x18015a1a0)
- LCMapStringW (Address: 0x18015a200)
- LeaveCriticalSection (Address: 0x18015a060)
- LoadLibraryExA (Address: 0x18015a370)
- LoadLibraryExW (Address: 0x18015a150)
- LocalAlloc (Address: 0x18015a048)
- LocalFree (Address: 0x18015a298)
- MapViewOfFile (Address: 0x18015a2d8)
- MapViewOfFileEx (Address: 0x18015a318)
- MultiByteToWideChar (Address: 0x18015a1d0)
- QueryPerformanceCounter (Address: 0x18015a080)
- RaiseException (Address: 0x18015a118)
- ReadConsoleW (Address: 0x18015a278)
- ReadFile (Address: 0x18015a270)
- ReleaseSRWLockExclusive (Address: 0x18015a330)
- ReleaseSRWLockShared (Address: 0x18015a338)
- RtlCaptureContext (Address: 0x18015a0a0)
- RtlLookupFunctionEntry (Address: 0x18015a0a8)
- RtlPcToFileHeader (Address: 0x18015a158)
- RtlUnwindEx (Address: 0x18015a0f8)
- RtlVirtualUnwind (Address: 0x18015a0b0)
- SetEndOfFile (Address: 0x18015a308)
- SetEnvironmentVariableW (Address: 0x18015a1f0)
- SetFileAttributesW (Address: 0x18015a2e8)
- SetFilePointerEx (Address: 0x18015a268)
- SetLastError (Address: 0x18015a108)
- SetStdHandle (Address: 0x18015a238)
- SetUnhandledExceptionFilter (Address: 0x18015a0c8)
- Sleep (Address: 0x18015a058)
- SubmitThreadpoolWork (Address: 0x18015a398)
- TerminateProcess (Address: 0x18015a0f0)
- TlsAlloc (Address: 0x18015a128)
- TlsFree (Address: 0x18015a140)
- TlsGetValue (Address: 0x18015a130)
- TlsSetValue (Address: 0x18015a138)
- TryEnterCriticalSection (Address: 0x18015a388)
- UnhandledExceptionFilter (Address: 0x18015a0c0)
- UnmapViewOfFile (Address: 0x18015a2c0)
- VirtualAlloc (Address: 0x18015a2f0)
- VirtualFree (Address: 0x18015a2f8)
- VirtualProtect (Address: 0x18015a360)
- VirtualQuery (Address: 0x18015a368)
- WaitForThreadpoolWorkCallbacks (Address: 0x18015a3a0)
- WideCharToMultiByte (Address: 0x18015a1d8)
- WriteConsoleW (Address: 0x18015a290)
- WriteFile (Address: 0x18015a248)
ole32.dll
- CoTaskMemAlloc (Address: 0x18015a3b8)
- CoTaskMemFree (Address: 0x18015a3c0)